.product-purple li { color: #ffff; } p#ipp-innertext { color: #fff; }
Digital Forensics
Exterro FTK Enterprise

Investigate remote endpoints with Exterro FTK Enterprise.

Remotely collect and examine endpoint data across the enterprise to respond to security incidents, data breaches, and internal investigations. FTK Enterprise provides centralized, scalable, and defensible evidence acquisition without disrupting business operations.

Industry-leading companies trust Exterro FTK for digital forensics and incident response.
Image On
Image On
Image On
Image On
Image On
Image On
Overview
Quickly identify and understand activity putting your organization at risk.

Use FTK Enterprise to expose and investigate a variety of criminal and malicious activities, including data breaches, database tampering, inappropriate sharing of confidential company information, deletion of files, wiping of hard drives, or viewing of inappropriate content.

Discreet Data Acquisition
Discretion can be critical when conducting internal investigations, so FTK® Enterprise uses covert, agent-based technology to ensure that employees and teams aren’t alerted as you acquire remote data.
Pinpoint Evidence
Eliminate the hours spent manually digging through endpoint registry data, internet history, and system summary files for the data you’re interested in.
Respond Quickly with Defensible Collection
Preserve and collect endpoint data immediately when an incident occurs, enabling investigators to determine what happened before evidence is altered or lost.
Investigate employee wrongdoing from anywhere with Remote Endpoint Collection.

FTK Enterprise can deploy agents to each endpoint (including Macs), and then perform discreet agent-based remote collection to a secure, encrypted forensic container.  

Assess endpoint data prior to collection with Live Preview.

Full-disk collection takes up time and storage space. With FTK Enterprise, you can perform a rapid risk assessment of a suspected compromised endpoint by previewing the contents to see the endpoint’s folder structure, filter for specific file and data types, and view files of interest before performing a collection.

Instantly preserve endpoint evidence with cybersecurity automation.

Integrate FTK Enterprise with SOAR and SIEM solutions to instantly preserve and collect endpoint evidence upon detection of an intrusion, with optional FTK Connect automation.  Exterro’s seamless integration with cybersecurity platforms like Cortex XSOAR reduces risk and speeds up internal breach investigations, with 24/7 real-time evidence collection and auditable preservation capabilities.

Ready to learn more?

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat.

Ready

“This system reduces the burden of the staff in the FOIA Request Service Center during the collection, review and preparation of documents and materials in response to FOIA requests.”

Complementary Exterro Tools
Headline Option
Reduce risk, and streamline compliance, across legal, privacy, and security functions.
Headline Option
Reduce risk, and streamline compliance, across legal, privacy, and security functions.
Headline Option
Reduce risk, and streamline compliance, across legal, privacy, and security functions.
Remotely preview and collect mobile device data with Exterro Remote Mobile Discovery.

Streamline and simplify your investigatory workflows with our patent-pending solution to the challenge of investigating mobile devices remotely. Exterro Remote Mobile Discovery empowers forensic investigators with the ability to collect data without shipping devices, wired connections, or intrusive agents installed on mobile devices.

Remote mobile data collection made easy for legal and compliance teams.
"Exterro’s intuitive platform makes mobile data collection accessible to legal and compliance teams, enabling them to efficiently review mobile data alongside other evidence for faster, more effective case resolution."
Ryan O'Leary
Research Director, Privacy and Legal Technology, IDC
Additional Capabilities
Zero Trust Compliant
Conduct remote endpoint collection, preview, and remediation securely within a Zero Trust framework such as ZScaler, using encrypted public site server technology.
Memory Comparison
Easily compare an endpoint's volatile data to the previous time you previewed it to locate differences in processes or applications that are running.
Targeted Collection
Target specific locations on the endpoint, then apply filters to limit the size and scope of the collection and bypass irrelevant data.
Mac Data Review
Collect, parse and render Apple Mail, iMessage, iWork files, Safari browser data, Outlook for Mac email, Mac Artifacts, and Mac system summary data like Spotlight Search, KnowledgeC, and Power Log data.
Innovative partners for your entire DFIR workflow.

Internal investigations begin at the moment a threat is detected, so Exterro integrates with the best innovators from cybersecurity platforms and zero trust technologies to post-incident analysis powerhouses.

Extero FTK Enterprise
Frequently Asked Questions

What kinds of devices or data sources can Exterro FTK Enterprise collect from?
Does Exterro FTK Enterprise use a persistent agent, and how is it installed?
Can I deploy the Exterro FTK Enterprise remote agent on an as-needed basis?
How does the remote endpoint agent perform a collection?
What kind of data types can Exterro FTK Enterprise investigate?
What happens if a remote endpoint goes offline during a collection?
Major New York City hospital system chooses Exterro FTK Enterprise.

From multiple locations to massive employee pools and remote workers, this hospital system needed to access their entire network of endpoints to identify potential threats and eliminate them before they became full-blown incidents.

Mitigate costly investigations and legal exposure.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique.

Featured Remote Investigation Resources

Learn about the best practices and technology that can help your organization improve its investigatory workflows.

Exterro FTK Enterprise

Ready to get started?

See our digital forensics and cybersecurity investigation solutions in action.